Secure Transmission Protocol for the IoT
Title | Secure Transmission Protocol for the IoT |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Hsueh, Sue-Chen, Li, Jian-Ting |
Conference Name | Proceedings of the 3rd International Conference on Industrial and Business Engineering |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5351-9 |
Keywords | compositionality, Information security, Internet of Thing, policy, policy-based collaboration, privacy, protocol verification, pubcrawl, transmission protocol |
Abstract | Deploying Internet of Things (IoT) applications over wireless networks has become commonplace. The transmission of unencrypted data between IOT devices gives malicious users the opportunity to steal personal information. Despite resource-constrained in the IoT environment, devices need to apply authentication methods to encrypt information and control access rights. This paper introduces a trusted third-party method of identity verification and exchange of keys that minimizes the resources required for communication between devices. A device must be registered in order to obtain a certificate and a session key, for verified identity and encryption communication. Malicious users will not be able to obtain private information or to use it wrongly, as this would be protected by authentication and access control |
URL | https://dl.acm.org/citation.cfm?doid=3133811.3133824 |
DOI | 10.1145/3133811.3133824 |
Citation Key | hsueh_secure_2017 |